期刊文献+

高质量信道上回声隐藏法秘密信息提取出错原因分析 被引量:3

Analysis on error reasons of secret information extraction in high quality channel by echo hiding method
下载PDF
导出
摘要 回声信息隐藏是通过在载体语音中嵌入不同延时的回声来实现信息隐藏的一种技术。介绍回声隐藏算法的基本原理,分析回声隐藏法秘密信息提取的关键步骤,即计算隐藏秘密信息后语音的倒谱,并结合线性卷积与循环卷积的关系,推导及总结了在高质量信道上利用回声隐藏法进行隐蔽通信时秘密信息提取出错的原因。分析表明,实际应用中可根据语音在延迟处的倒谱值自适应地调节回声衰减因子的大小,提高回声隐藏法秘密信息恢复的准确率。 Echo information hiding is a technique to realize information hiding by embedding different delay echoes in carrier voice. The basic principle of echo hiding algorithm is introduced. The key steps of secret information extraction with echo hiding method is analyzed,that is the voice cepstrum after calculating the hiding secret information. According to the relation of linear convolution and cycle convolution,the error reasons of secret information extraction when the hiding communication is imple-mented with echo hiding method in high quality channel are deduced and summarized. The accuracy of secret information recovery with echo hiding method is improved by regulating the size of echo decay factor adaptively according to the cepstrum value in delay areas of the voice.
作者 原晨 高勇
出处 《现代电子技术》 北大核心 2015年第11期103-106,111,共5页 Modern Electronics Technique
关键词 回声隐藏 倒谱 线性卷积 循环卷积 高质量信道 echo hiding cepstrum linear convolution cycle convolution high quality channel
  • 相关文献

参考文献10

  • 1JOHNSON N F, JAJODIA S. Exploring steganography: seeing the unseen [J]. Computer, 1998, 51(?-) : 26-54.
  • 2康芳,谭薇,杨森斌.信息隐藏技术及其在军事通信领域的应用研究[J].现代电子技术,2008,31(23):97-99. 被引量:5
  • 3COOPERMAN M, MOSKOWITZ S A. Steganographic method and device: US, 5613004 [P]. 1997-03-18.
  • 4BENDER W, GRUHL D, MORIMOTO N, et al. Techniques for data hiding [J]. IBM Systems Journal, 1996, 35(3/4): 313-336.
  • 5LEE C U, MOALLEI K, WARREN R L. Method and appara- tus for transporting auxiliary data in audio signals: US, 5822360 [P]. 1998-10-13.
  • 6ANDERSON Ross. Information hiding [M]. Berlin: Springer, 1996.
  • 7OH H O, SEOK J W, HONG J W, et al. New echo embedding technique for robust and imperceptible audio watermarking [C]// Proceedings of 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Sait Lake: IEEE, 2001, 3: 1341-1344.
  • 8KIM H J, CHOI Y H. A novel echo-hiding scheme with back- ward and forward kernels [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8) : 885-889.
  • 9ERFANI Y, MOIN M S, PARVIZ M. New methods for trans- parent and accurate echo hiding by using the original audio cepstral content [C]// 2007 IEEE International Conference on Computer and Information Science. [S.1.]: IEEE, 2007: 1087- 1092.
  • 10MITRA S, MANOHARAN S. Experiments with and enhance- ments to echo hiding [C]//2009 IEEE International Conference on Systems and Networks Communications. Porto, Portugal: IEEE, 2009: 119-124.

二级参考文献8

  • 1闫佩君,钱聪.基于分形维数的语音信息隐藏方法[J].现代电子技术,2006,29(23):48-50. 被引量:2
  • 2Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn. Information Hiding - A Survey [J]. Proceedings of the IEEE,1999,87(7) :1062-1078.
  • 3杨森斌.音频信息隐藏技术与应用研究[D].西安:西安通信学院,2008.
  • 4Nevena Lazic, Parham Aarabi. Communication over an Acoustic Channel Using Data Hiding Techniques[J]. IEEE Transactions on Multimedia, 2006,8(5) : 918 - 924.
  • 5Ingemar J Cox, Matthew L Miller,Jeffrey A Bloom. Digital Watermarking[M]. USA Vermont:Morgan Kaufmann Publishers, 2002.
  • 6Andreas Lang, Jana Dittmann, Ryan Spring, et al. Audio Watermark Attacks:From Single to Profile Attacks[EB/OL]. http://wwwiti. cs. uni - magdeburg, de/- alang/index. html,2005.
  • 7邓宗元,杨震.基于语音识别的伪装通信方法[P].中国,发明专利,CN1901442,2007.
  • 8余先刚 骆炜 韩占芬.一种基于小波变换的自同步音频盲水印技术.西安通信学院学报,2007,6(2):1-3.

共引文献4

同被引文献21

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部